نتایج جستجو برای: byzantine iconography

تعداد نتایج: 4041  

Journal: : 2023

Absztrakt A késő avar ornamentika összképe erős antik hatás alatt alakult ki. tanulmány a kori díszítőművészetben megjelenő, típusú, valószínűleg bizánci eredetű alakokat és jeleneteket veszi sorra. Közülük más-más típusúakkal találkozunk kor elején, valamint közepén második felében, úgy tűnik, hogy e két csoport esetében az környezet adaptációs mechanizmusai is különbözőek. korábbi erősebb hat...

2014
Hung TRAN-THE Hugues FAUCONNIER Joffroy Beauquier Matthieu Latapy

So far, the distributed computing community has either assumed that all the processes of a distributed system have distinct identifiers or, more rarely, that the processes are anonymous and have no identifiers. These are two extremes of the same general model: namely, n processes use l different identifiers, where 1 ≤ l ≤ n. We call this model homonymous model. To determine the power of homonym...

2015
John Augustine Gopal Pandurangan Peter Robinson

We study the fundamental Byzantine leader election problem in dynamic networks where the topology can change from round to round and nodes can also experience heavy churn (i.e., nodes can join and leave the network continuously over time). We assume the full information model where the Byzantine nodes have complete knowledge about the entire state of the network at every round (including random...

Journal: :IACR Cryptology ePrint Archive 2002
Shafi Goldwasser Yehuda Lindell

It has recently been shown that executions of authenticated Byzantine Agreement protocols in which more than a third of the parties are corrupted, cannot be composed concurrently, in parallel, or even sequentially (where the latter is true for deterministic protocols). This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In...

2006
Andreas Haeberlen Petr Kuznetsov Peter Druschel

Distributed systems are subject to a variety of failures and attacks. In this paper, we consider general (Byzantine) failures [11], in which a failed node may exhibit arbitrary behavior. In particular, a failed node may corrupt its local state, send random messages, or even send specific messages aimed at subverting the system. Many security attacks can be modeled as Byzantine failures, such as...

2016
A. Negură

EXCESSIVE PRIMARY POSTPARTUM HEMORRHAGE (Abstract). The diagnosis and treatment of excessive bleeding within the first 24 hours after delivery and its main causes, namely uterine atony, retained placental fragments, vascular lesions by local tissue rupture, and blood clotting disorder are presented. Of great interest is the iconography, which is suggestive and original.

2003
K. Driscoll B. Hall Håkan Sivencrona P. Zumsteg

Since its introduction nearly 20 years ago, the Byzantine Generals Problem has been the subject of many papers having the scrutiny of the fault tolerance community. Numerous Byzantine tolerant algorithms and architectures have been proposed. However, this problem is not yet sufficiently understood by those who design, build, and maintain systems with high dependability requirements. Today, ther...

2013
Katarzyna Krupa Monika Bekiesinska-Figatowska

The purpose of this review is to illustrate the wide spectrum of lesions in the corpus callosum, both congenital and acquired: developmental abnormalities, phakomatoses, neurometabolic disorders, demyelinating diseases, infection and inflammation, vascular lesions, neoplasms, traumatic and iatrogenic injury, and others. Cases include fetuses, children, and adults with rich iconography from the ...

2007
Lindsey Ford

We introduce a new visual programming system VisualProlog. The system addresses classic issues of visual interfaces: layout, shape, colour, and iconography; and those of particular concern to visual programming: multiple views (visual abstractions), synchronised views, integration of visual and textual dimensions, visual debugging, cognitive dimensions, and the problems of scale. We brieey desc...

2009
Allen Clement Edmund L. Wong Lorenzo Alvisi Michael Dahlin Mirco Marchetti

This paper argues for a new approach to building Byzantine fault tolerant systems. We observe that although recently developed BFT state machine replication protocols are quite fast, they don’t actually tolerate Byzantine faults very well: a single faulty client or server is capable of rendering PBFT, Q/U, HQ, and Zyzzyva virtually unusable. In this paper, we (1) demonstrate that existing proto...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید